Research
members

Account Takeover via browsable intent filter in Android app

Ovi
Ovi
Mobile app security is an interesting field; since app sandbox restrictions are very good, finding security issues can be extremely hard. Once you start delving into applications more and more,…
Journal

instructSOCIETY | Visual programming of malware tutorial & project files // part 2

Ovi
Ovi
Journal
members

instructSOCIETY | Malware digraphs & modelling // part 1

Ovi
Ovi
The visualization of malware has been a widely discussed topic over the years, though it hasn't garnered as much attention in the last decade. Nearly ten years ago,…
RE:archive | APT37's ROKRAT HWP Object Linking and Embedding
REarchive
members

RE:archive | APT37's ROKRAT HWP Object Linking and Embedding

Ovi
Ovi
Research
members

RE:privacy | Glow Fertility women's health app - IDOR vulnerability leads to 25 million userbase dataleak

Ovi
Ovi
Summary As part of the RE:privacy project, I am reverse engineering and hacking reproductive health apps to interrogate the security and privacy of these products. You can find out…
Government intervention on Mastodon & the fediverse. Matters of security, privacy & sustainability.
Journal
members

Government intervention on Mastodon & the fediverse. Matters of security, privacy & sustainability.

Ovi
Ovi
Newsletter
members

[0x0v1] Newsletter | Hacktivist Field Guide: Reverse engineering [Part 2]

Ovi
Ovi
Newsletter
members

[0x0v1] Newsletter | Hacktivist Field Guide: Reverse engineering [Part 1]

Ovi
Ovi
"The Techno-Optimist Manifesto" is proof tech VCs don't have the answers
Journal
members

"The Techno-Optimist Manifesto" is proof tech VCs don't have the answers

Ovi
Ovi
Reverse engineering: an art of digital protest & civil disobedience
Journal
members

Reverse engineering: an art of digital protest & civil disobedience

Ovi
Ovi